1 /*
2 * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <stdio.h>
11 #include "internal/cryptlib.h"
12 #include <openssl/objects.h>
13 #include <openssl/evp.h>
14 #include <openssl/engine.h>
15 #include "crypto/evp.h"
16 #include "evp_local.h"
17
18 /* This call frees resources associated with the context */
EVP_MD_CTX_reset(EVP_MD_CTX * ctx)19 int EVP_MD_CTX_reset(EVP_MD_CTX *ctx)
20 {
21 if (ctx == NULL)
22 return 1;
23
24 /*
25 * Don't assume ctx->md_data was cleaned in EVP_Digest_Final, because
26 * sometimes only copies of the context are ever finalised.
27 */
28 if (ctx->digest && ctx->digest->cleanup
29 && !EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_CLEANED))
30 ctx->digest->cleanup(ctx);
31 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data
32 && !EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_REUSE)) {
33 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size);
34 }
35 /*
36 * pctx should be freed by the user of EVP_MD_CTX
37 * if EVP_MD_CTX_FLAG_KEEP_PKEY_CTX is set
38 */
39 if (!EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX))
40 EVP_PKEY_CTX_free(ctx->pctx);
41 #ifndef OPENSSL_NO_ENGINE
42 ENGINE_finish(ctx->engine);
43 #endif
44 OPENSSL_cleanse(ctx, sizeof(*ctx));
45
46 return 1;
47 }
48
EVP_MD_CTX_new(void)49 EVP_MD_CTX *EVP_MD_CTX_new(void)
50 {
51 return OPENSSL_zalloc(sizeof(EVP_MD_CTX));
52 }
53
EVP_MD_CTX_free(EVP_MD_CTX * ctx)54 void EVP_MD_CTX_free(EVP_MD_CTX *ctx)
55 {
56 EVP_MD_CTX_reset(ctx);
57 OPENSSL_free(ctx);
58 }
59
EVP_DigestInit(EVP_MD_CTX * ctx,const EVP_MD * type)60 int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type)
61 {
62 EVP_MD_CTX_reset(ctx);
63 return EVP_DigestInit_ex(ctx, type, NULL);
64 }
65
EVP_DigestInit_ex(EVP_MD_CTX * ctx,const EVP_MD * type,ENGINE * impl)66 int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl)
67 {
68 EVP_MD_CTX_clear_flags(ctx, EVP_MD_CTX_FLAG_CLEANED);
69 #ifndef OPENSSL_NO_ENGINE
70 /*
71 * Whether it's nice or not, "Inits" can be used on "Final"'d contexts so
72 * this context may already have an ENGINE! Try to avoid releasing the
73 * previous handle, re-querying for an ENGINE, and having a
74 * reinitialisation, when it may all be unnecessary.
75 */
76 if (ctx->engine && ctx->digest &&
77 (type == NULL || (type->type == ctx->digest->type)))
78 goto skip_to_init;
79 if (type) {
80 /*
81 * Ensure an ENGINE left lying around from last time is cleared (the
82 * previous check attempted to avoid this if the same ENGINE and
83 * EVP_MD could be used).
84 */
85 ENGINE_finish(ctx->engine);
86 if (impl != NULL) {
87 if (!ENGINE_init(impl)) {
88 EVPerr(EVP_F_EVP_DIGESTINIT_EX, EVP_R_INITIALIZATION_ERROR);
89 return 0;
90 }
91 } else {
92 /* Ask if an ENGINE is reserved for this job */
93 impl = ENGINE_get_digest_engine(type->type);
94 }
95 if (impl != NULL) {
96 /* There's an ENGINE for this job ... (apparently) */
97 const EVP_MD *d = ENGINE_get_digest(impl, type->type);
98
99 if (d == NULL) {
100 EVPerr(EVP_F_EVP_DIGESTINIT_EX, EVP_R_INITIALIZATION_ERROR);
101 ENGINE_finish(impl);
102 return 0;
103 }
104 /* We'll use the ENGINE's private digest definition */
105 type = d;
106 /*
107 * Store the ENGINE functional reference so we know 'type' came
108 * from an ENGINE and we need to release it when done.
109 */
110 ctx->engine = impl;
111 } else
112 ctx->engine = NULL;
113 } else {
114 if (!ctx->digest) {
115 EVPerr(EVP_F_EVP_DIGESTINIT_EX, EVP_R_NO_DIGEST_SET);
116 return 0;
117 }
118 type = ctx->digest;
119 }
120 #endif
121 if (ctx->digest != type) {
122 if (ctx->digest && ctx->digest->ctx_size) {
123 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size);
124 ctx->md_data = NULL;
125 }
126 ctx->digest = type;
127 if (!(ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) && type->ctx_size) {
128 ctx->update = type->update;
129 ctx->md_data = OPENSSL_zalloc(type->ctx_size);
130 if (ctx->md_data == NULL) {
131 EVPerr(EVP_F_EVP_DIGESTINIT_EX, ERR_R_MALLOC_FAILURE);
132 return 0;
133 }
134 }
135 }
136 #ifndef OPENSSL_NO_ENGINE
137 skip_to_init:
138 #endif
139 if (ctx->pctx) {
140 int r;
141 r = EVP_PKEY_CTX_ctrl(ctx->pctx, -1, EVP_PKEY_OP_TYPE_SIG,
142 EVP_PKEY_CTRL_DIGESTINIT, 0, ctx);
143 if (r <= 0 && (r != -2))
144 return 0;
145 }
146 if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT)
147 return 1;
148 return ctx->digest->init(ctx);
149 }
150
EVP_DigestUpdate(EVP_MD_CTX * ctx,const void * data,size_t count)151 int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count)
152 {
153 if (count == 0)
154 return 1;
155
156 return ctx->update(ctx, data, count);
157 }
158
159 /* The caller can assume that this removes any secret data from the context */
EVP_DigestFinal(EVP_MD_CTX * ctx,unsigned char * md,unsigned int * size)160 int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size)
161 {
162 int ret;
163 ret = EVP_DigestFinal_ex(ctx, md, size);
164 EVP_MD_CTX_reset(ctx);
165 return ret;
166 }
167
168 /* The caller can assume that this removes any secret data from the context */
EVP_DigestFinal_ex(EVP_MD_CTX * ctx,unsigned char * md,unsigned int * size)169 int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size)
170 {
171 int ret;
172
173 OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE);
174 ret = ctx->digest->final(ctx, md);
175 if (size != NULL)
176 *size = ctx->digest->md_size;
177 if (ctx->digest->cleanup) {
178 ctx->digest->cleanup(ctx);
179 EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_CLEANED);
180 }
181 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size);
182 return ret;
183 }
184
EVP_DigestFinalXOF(EVP_MD_CTX * ctx,unsigned char * md,size_t size)185 int EVP_DigestFinalXOF(EVP_MD_CTX *ctx, unsigned char *md, size_t size)
186 {
187 int ret = 0;
188
189 if (ctx->digest->flags & EVP_MD_FLAG_XOF
190 && size <= INT_MAX
191 && ctx->digest->md_ctrl(ctx, EVP_MD_CTRL_XOF_LEN, (int)size, NULL)) {
192 ret = ctx->digest->final(ctx, md);
193
194 if (ctx->digest->cleanup != NULL) {
195 ctx->digest->cleanup(ctx);
196 EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_CLEANED);
197 }
198 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size);
199 } else {
200 EVPerr(EVP_F_EVP_DIGESTFINALXOF, EVP_R_NOT_XOF_OR_INVALID_LENGTH);
201 }
202
203 return ret;
204 }
205
EVP_MD_CTX_copy(EVP_MD_CTX * out,const EVP_MD_CTX * in)206 int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in)
207 {
208 EVP_MD_CTX_reset(out);
209 return EVP_MD_CTX_copy_ex(out, in);
210 }
211
EVP_MD_CTX_copy_ex(EVP_MD_CTX * out,const EVP_MD_CTX * in)212 int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in)
213 {
214 unsigned char *tmp_buf;
215 if ((in == NULL) || (in->digest == NULL)) {
216 EVPerr(EVP_F_EVP_MD_CTX_COPY_EX, EVP_R_INPUT_NOT_INITIALIZED);
217 return 0;
218 }
219 #ifndef OPENSSL_NO_ENGINE
220 /* Make sure it's safe to copy a digest context using an ENGINE */
221 if (in->engine && !ENGINE_init(in->engine)) {
222 EVPerr(EVP_F_EVP_MD_CTX_COPY_EX, ERR_R_ENGINE_LIB);
223 return 0;
224 }
225 #endif
226
227 if (out->digest == in->digest) {
228 tmp_buf = out->md_data;
229 EVP_MD_CTX_set_flags(out, EVP_MD_CTX_FLAG_REUSE);
230 } else
231 tmp_buf = NULL;
232 EVP_MD_CTX_reset(out);
233 memcpy(out, in, sizeof(*out));
234
235 /* copied EVP_MD_CTX should free the copied EVP_PKEY_CTX */
236 EVP_MD_CTX_clear_flags(out, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX);
237
238 /* Null these variables, since they are getting fixed up
239 * properly below. Anything else may cause a memleak and/or
240 * double free if any of the memory allocations below fail
241 */
242 out->md_data = NULL;
243 out->pctx = NULL;
244
245 if (in->md_data && out->digest->ctx_size) {
246 if (tmp_buf)
247 out->md_data = tmp_buf;
248 else {
249 out->md_data = OPENSSL_malloc(out->digest->ctx_size);
250 if (out->md_data == NULL) {
251 EVPerr(EVP_F_EVP_MD_CTX_COPY_EX, ERR_R_MALLOC_FAILURE);
252 return 0;
253 }
254 }
255 memcpy(out->md_data, in->md_data, out->digest->ctx_size);
256 }
257
258 out->update = in->update;
259
260 if (in->pctx) {
261 out->pctx = EVP_PKEY_CTX_dup(in->pctx);
262 if (!out->pctx) {
263 EVP_MD_CTX_reset(out);
264 return 0;
265 }
266 }
267
268 if (out->digest->copy)
269 return out->digest->copy(out, in);
270
271 return 1;
272 }
273
EVP_Digest(const void * data,size_t count,unsigned char * md,unsigned int * size,const EVP_MD * type,ENGINE * impl)274 int EVP_Digest(const void *data, size_t count,
275 unsigned char *md, unsigned int *size, const EVP_MD *type,
276 ENGINE *impl)
277 {
278 EVP_MD_CTX *ctx = EVP_MD_CTX_new();
279 int ret;
280
281 if (ctx == NULL)
282 return 0;
283 EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_ONESHOT);
284 ret = EVP_DigestInit_ex(ctx, type, impl)
285 && EVP_DigestUpdate(ctx, data, count)
286 && EVP_DigestFinal_ex(ctx, md, size);
287 EVP_MD_CTX_free(ctx);
288
289 return ret;
290 }
291
EVP_MD_CTX_ctrl(EVP_MD_CTX * ctx,int cmd,int p1,void * p2)292 int EVP_MD_CTX_ctrl(EVP_MD_CTX *ctx, int cmd, int p1, void *p2)
293 {
294 if (ctx->digest && ctx->digest->md_ctrl) {
295 int ret = ctx->digest->md_ctrl(ctx, cmd, p1, p2);
296 if (ret <= 0)
297 return 0;
298 return 1;
299 }
300 return 0;
301 }
302